{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:36:15Z","timestamp":1729672575936,"version":"3.28.0"},"reference-count":41,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1109\/sadfe.2013.6911542","type":"proceedings-article","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T16:39:23Z","timestamp":1412095163000},"page":"1-6","source":"Crossref","is-referenced-by-count":7,"title":["Digital forensic investigation in cloud computing environment: Impact on privacy"],"prefix":"10.1109","author":[{"given":"Filipo","family":"Sharevski","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"Legal Aspects of Collecting and Preserving Computer Forensic Evidence GSEC Practical v1 2c SANS Triangle Park Security Essentials Course","year":"2001","author":"witter","key":"19"},{"key":"35","first-page":"28","volume":"4","author":"grispos","year":"2012","journal-title":"Calm before the Storm The Challenges of Cloud Computing in Digital Forensics"},{"key":"17","first-page":"1","article-title":"Legal aspects of digital forensics: A research agenda","author":"nance","year":"2007","journal-title":"System Sciences (HICSS 2011 44th Hawaii International Conference on 4-7 January"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/SADFE.2011.17"},{"journal-title":"Legal Aspects of Digital Forensics","year":"2002","author":"ryan","key":"18"},{"key":"33","first-page":"2205","article-title":"Defogging the cloud: Applying fourth amendment principles to evolving privacy expectations in cloud computing","volume":"93","author":"couillard","year":"2009","journal-title":"Minnesota Law Review"},{"journal-title":"Handbook of Digital Forensics and Investigation","year":"2009","author":"casey","key":"15"},{"key":"34","first-page":"236","author":"zargari","year":"0","journal-title":"Cloud Forensics Concepts Issues and Challenges\""},{"key":"16","first-page":"531","article-title":"Searches and seizures in digital world","volume":"119","author":"kerr","year":"2005","journal-title":"Harvard Law Review"},{"key":"39","volume":"63","author":"bradshaw","year":"2010","journal-title":"Contracts for Clouds Comparison and Analysis of the Terms and Conditions of Cloud Computing Services"},{"key":"13","first-page":"800","article-title":"Guide to integrating forensic techniques into incident response","author":"kent","year":"2006","journal-title":"NIST Special Publication"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-59749-586-8.00001-7"},{"journal-title":"Privacy-An Introduction to Generally Accepted Privacy Principles","year":"2009","key":"37"},{"key":"11","first-page":"612","article-title":"Cybercrime forensic system in cloud computing","author":"yan","year":"2011","journal-title":"International Conference on Image Analysis and Signal Processing (IASP"},{"key":"38","first-page":"105","article-title":"Security and privacy in cloud computing: A survey","author":"rong","year":"2010","journal-title":"Semantics Knowledge and Grid (SKG) Onference"},{"key":"12","first-page":"1","article-title":"Digital forensic framework for a cloud environment","author":"sibiya","year":"2012","journal-title":"IST-Africa 2012 Conference Proceedings Tanzania"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/2184512.2184518"},{"journal-title":"Virtualization and Forensics A Digital Forensic Investigator's Guide to Virtual Environments","year":"2010","author":"barrett","key":"20"},{"journal-title":"Service Description at","year":"0","key":"41"},{"journal-title":"Service Description at","year":"0","key":"40"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.mcm.2011.02.011"},{"key":"23","first-page":"4328v","article-title":"Live digital forensics in a virtual machine","author":"zhang","year":"2010","journal-title":"Computer Application and System Modeling (ICCASM) 2010 International Conference on"},{"key":"24","first-page":"145","article-title":"Isolating a cloud instance for a digital forensic investigation","author":"delport","year":"2011","journal-title":"Proc Of ISSA Conference 2011 Johannesburg South Africa"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/INDCON.2011.6139350"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24097-3_62"},{"key":"27","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.IR.7559","author":"singhal","year":"2010","journal-title":"Forensics Web Services (FWS NIST Interagency Report Draft"},{"journal-title":"Digital Forensics for Network Internet and Cloud Computing A Forensic Evidence Guide for Moving Targets and Data","year":"2010","author":"lillard","key":"28"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/1982185.1982226"},{"key":"3","article-title":"It cloud services user survey, pt.2: Top benefits and challenges","author":"gens","year":"0","journal-title":"International Data Corporation | 10-2-2008"},{"key":"2","article-title":"5 cloud business benefits","author":"schouten","year":"0","journal-title":"Wired Innovation Insights | 10-16-2012"},{"key":"10","first-page":"248","article-title":"Forensic investigations in cloud environments","author":"guo","year":"2012","journal-title":"2012 International Conference on Computer Science and Information Processing (CSIP"},{"key":"1","article-title":"The nist definition of cloud computing","author":"mell","year":"2012","journal-title":"NIST Special Publication 800-145 National Institute of Standards and Technology Gaithersburg"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2012.05.015"},{"key":"7","article-title":"DTR-T001-01 Technical Report. A Road Map for Digital Forensic Research","author":"palmer","year":"2001","journal-title":"Digital Forensics Workshop (DFRWS) Utica New York"},{"key":"6","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/978-3-642-24212-0_3","article-title":"Cloud forensics","volume":"361","author":"carthy","year":"2011","journal-title":"Advances in Digital Forensics VII-IFIP Advances in Information and Communication Technology"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(11)70024-1"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2013.02.004"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2012.05.001"},{"key":"4","article-title":"Survey on cloud forensics and critical criteria for cloud forensic capability: A preliminary analysis","author":"ruan","year":"2011","journal-title":"Proceedings of the 2011 ADFSL Conference on Digital Forensics Security and Law"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2012.6477673"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2012.07.001"}],"event":{"name":"2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE)","start":{"date-parts":[[2013,11,21]]},"location":"Hong Kong, Hong Kong","end":{"date-parts":[[2013,11,22]]}},"container-title":["2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6902669\/6911532\/06911542.pdf?arnumber=6911542","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,15]],"date-time":"2019-08-15T13:25:48Z","timestamp":1565875548000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6911542\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/sadfe.2013.6911542","relation":{},"subject":[],"published":{"date-parts":[[2013,11]]}}}